When Trying to search for a log with a source IP, destination IP or any other flags, Filters can be used. The filters need to be put in the search section under GUI: Monitor > Logs > Traffic (or other logs). This document demonstrates several methods of filtering and looking for specific types of traffic on Palo Alto Networks firewalls. Categories of filters include host, zone, port, or date/time. At the end of the list, we include a few examples that combine various filters for more comprehensive searching.
Host Traffic Filter Examples
- Teamviewer Showing Ip Address Instead Of Id Password
- Teamviewer Showing Ip Address Instead Of Id Spoofing
- Teamviewer Showing Ip Address Instead Of Id Number
- Teamviewer Ip Address Whitelist
There is another more difficult way to extend the TeamViewer usage by resetting the TeamViewer ID. TeamViewer ID is generated based on several unique attributes of your computer: MAC address of the network card; VolumeID of disk partition; Creation date of folder Program Files. Accordingly, to change TeamViewer ID, you need to change these 3. Connect to PC using computer name instead of IP address « on: December 02, 2012, 04:20:35 PM » I have all of the machines on my home network set up with TeamViewer and set to ONLY allow LAN. Login with IP instead of ID I have a computer running Teamviewer but I have misplaced the Teamviewer ID for that machine. I do known the IP address and password. Explanation: shows all traffic coming from a host with an IP address of 1.1.1.1 and going to a host destination address of 2.2.2.2 To Host Range Note that you cannot specify an actual range but can use CIDR notation to specify a network range of addresses (addr.src in a.a.a.a/CIDR). See for yourself why millions of people around the world love using TeamViewer for remote access and remote control – download TeamViewer free for personal use. Download TeamViewer Free Try before you buy – experience the full power of TeamViewer for your business and unlock all the commercial features with a free 14-day trial (no credit.
- From Host a.a.a.a
(addr.src in a.a.a.a)
example: (addr.src in 1.1.1.1)
Explanation: shows all traffic from host ip address that matches 1.1.1.1 (addr.src in a.a.a.a)
- To Host b.b.b.b
(addr.dst in b.b.b.b)
example: (addr.dst in 2.2.2.2)
Explanation: shows all traffic with a destination address of a host that matches 2.2.2.2
- From Host a.a.a.a to Host b.b.b.b
(addr.src in a.a.a.a) and (addr.dst in b.b.b.b)
example: (addr.src in 1.1.1.1) and (addr.dst in 2.2.2.2)
Explanation: shows all traffic coming from a host with an IP address of 1.1.1.1 and going to a host destination address of 2.2.2.2
- To Host Range
Note that you cannot specify an actual range but can use CIDR notation to specify a network range of addresses
(addr.src in a.a.a.a/CIDR)
example: (addr.src in 10.10.10.2/30)
Explanation: shows all traffic coming from addresses ranging from 10.10.10.1 - 10.10.10.3.
- To or From Host a.a.a.a
(addr in a.a.a.a)
example: (addr in 1.1.1.1)
Explanation: shows all traffic with a source OR destination address of a host that matches 1.1.1.1
Zone Traffic Filter Examples:
- From Zone zone_a
(zone.src eq zone_a)
example: (zone.src eq PROTECT)
Explanation: shows all traffic coming from the PROTECT zone
- To Zone zone_b
(zone.dst eq zone_b)
example: (zone.dst eq OUTSIDE)
Explanation: shows all traffic going out the OUTSIDE zone
- From Zone zone_a to Zone zone_b
(zone.src eq zone_a) and (zone.dst eq zone_b)
example: (zone.src eq PROTECT) and (zone.dst eq OUTSIDE)
Explanation: shows all traffic traveling from the PROTECT zone and going out the OUTSIDE zone
Port Traffic Filter Examples:
- From Port aa
(port.src eq aa)
example: (port.src eq 22)
Explanation: shows all traffic traveling from source port 22
- To Port aa
(port.dst eq bb)
example: (port.dst eq 25)
Explanation: shows all traffic traveling to destination port 25
- From Port aa TO Port bb
(port.src eq aa) and (port.dst eq bb)
example: (port.src eq 23459) and (port.dst eq 22)
Explanation: shows all traffic traveling from source port 23459 and traveling to destination port 22
- From All Ports Less Than or Equal To Port aa
(port.src leq aa)
example: (port.src leq 22)
Explanation: shows all traffic traveling from source ports 1-22
- From All Ports Greater Than Or Equal To Port aa
(port.src geq aa)
example: (port.src geq 1024)
Explanation: shows all traffic traveling from source ports 1024 - 65535
- To All Ports Less Than Or Equal To Port aa
(port.dst leq aa)
example: (port.dst leq 1024)
Explanation: shows all traffic traveling to destination ports 1-1024
- To All Ports Greater Than Or Equal To Port aa
(port.dst geq aa)
example: (port.dst geq 1024)
Explanation: shows all traffic traveling to destination ports 1024-65535
- From Port Range aa Through bb
(port.src geq aa) and (port.src leq bb)
example: (port.src geq 20) and (port.src leq 53)
Explanation: shows all traffic traveling from source port range 20-53
- To Port Range aa Through bb
(port.dst geq aa) and (port.dst leq bb)
example: (port.dst geq 1024) and (port.dst leq 13002)
Explanation: shows all traffic traveling to destination ports 1024 - 13002
Date/Time Traffic Filter Examples:
- All Traffic for a Specific Date yyyy/mm/dd And Time hh:mm:ss
(receive_time eq 'yyyy/mm/dd hh:mm:ss')
example: (receive_time eq '2015/08/31 08:30:00')
Explanation: shows all traffic that was received on August 31, 2015 at 8:30am
- All Traffic Received On Or Before The Date yyyy/mm/dd And Time hh:mm:ss
(receive_time leq 'yyyy/mm/dd hh:mm:ss')
example: (receive_time leq '2015/08/31 08:30:00')
Explanation: shows all traffic that was received on or before August 31, 2015 at 8:30am
- All Traffic Received On Or After The Date yyyy/mm/dd And Time hh:mm:ss
(receive_time geq 'yyyy/mm/dd hh:mm:ss')
example: (receive_time geq '2015/08/31 08:30:00')
Explanation: shows all traffic that was received on or after August 31, 2015 at 8:30am
- All Traffic Received Between The Date-Time Range Of yyyy/mm/dd hh:mm:ss and YYYY/MM/DD HH:MM:SS
(receive_time geq 'yyyy/mm/dd hh:mm:ss') and (receive_time leq 'YYYY/MM/DD HH:MM:SS')
example: (receive_time geq '2015/08/30 08:30:00') and (receive_time leq '2015/08/31 01:25:00')
Explanation: shows all traffic that was received between August 30, 2015 8:30am and August 31, 2015 01:25 am
Interface Traffic Filter Examples:
- All Traffic Inbound On Interface ethernet1/x
(interface.src eq 'ethernet1/x')
example: (interface.src eq 'ethernet1/2')
Explanation: shows all traffic that was received on the PA Firewall interface Ethernet 1/2
- All Traffic Outbound On Interface ethernet1/x
(interface.dst eq 'ethernet1/x')
example: (interface.dst eq 'ethernet1/5')
Explanation: shows all traffic that was sent out on the PA Firewall interface Ethernet 1/5
Allowed/Denied Traffic Filter Examples
Teamviewer Showing Ip Address Instead Of Id Password
- All Traffic That Has Been Allowed By The Firewall Rules
(action eq allow)
OR
(action neq deny)
example: (action eq allow)
Explanation: shows all traffic allowed by the firewall rules. Placing the letter 'n' in front of 'eq' means 'not equal to,' so anything not equal to 'deny' is displayed, which is any allowed traffic.
- All Traffic Denied By The FireWall Rules.
(action eq deny)
OR
(action neq allow)
Teamviewer Showing Ip Address Instead Of Id Spoofing
example: (action eq deny)
Explanation: shows all traffic denied by the firewall rules. Placing the letter 'n' in front of 'eq' means 'not equal to,' so anything not equal to 'allow' is displayed, which is any denied traffic.
Combining Traffic Filter Examples
- All Traffic From Zone Outside And Network 10.10.10.0/24 TO Host Address 20.20.20.21 In The Protect Zone:
Teamviewer Showing Ip Address Instead Of Id Number
(zone.src eq OUTSIDE) and (addr.src in 10.10.10.0/24) and (addr.dst in 20.20.20.21) and (zone.dst eq PROTECT)
- All Traffic From Host 1.2.3.4 to Host 5.6.7.8 For The Time Range 8/30/2015 -08/31/2015
Teamviewer Ip Address Whitelist
(addr.src in 1.2.3.4) and (addr.dst in 5.6.7.8) and (receive_time geq '2015/08/30 00:00:00') and (receive_time leq '2015/08/31 23:59:59')